Analysis
-
max time kernel
24s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2025, 08:16
Behavioral task
behavioral1
Sample
PLigma32_ProjectLigmaV2.0.0.exe
Resource
win10v2004-20250207-en
General
-
Target
PLigma32_ProjectLigmaV2.0.0.exe
-
Size
217KB
-
MD5
6f01ea85513ed933da12cce31ccb9f3c
-
SHA1
ee7e8adbfd9563cf71b654834756e3117890dff6
-
SHA256
618dda19d824d906de30767c1332b45bd945e83a8dc34f32f74664cb7fba4948
-
SHA512
f440f4fe4c02447d4c292524fc67debb09faf01146408b77eb84833312e0ee3125c55b45cc23e3b0b6ca300de0c2fe31a809004767e9aed6e2c41c91187ccd4d
-
SSDEEP
3072:VrcRLkTCF7E0l3+fqZBI3Ib70yTuZxf3u4CTadMmO8YC+uxFNV9tf6T67NJr0N:eRj5m3IkyTAl3ut2dljB+uxr/t6OPY
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1297265064231043205/XDHM7OLDiEUDyMSpEP52XAoWoKDKd3t7MNGzJiC2bpD_qwj3W3pzZgwHIT-aArktzD8U
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Mercurialgrabber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 20 discord.com 17 discord.com 18 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip4.seeip.org 15 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString PLigma32_ProjectLigmaV2.0.0.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 PLigma32_ProjectLigmaV2.0.0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3600 PLigma32_ProjectLigmaV2.0.0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PLigma32_ProjectLigmaV2.0.0.exe"C:\Users\Admin\AppData\Local\Temp\PLigma32_ProjectLigmaV2.0.0.exe"1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4460